## https://sploitus.com/exploit?id=FA817AB9-1866-5F09-99FF-80B31948E6F0
The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution.
Compile: `gcc -o pwn pwn.c && gcc -o exploit exploit.c`